Welcome to GeekPolice!

Our Appeal to YOU: Please join and help us grow this website. We truly love technology and security and we want to share it with the world. Recognize the excitement of technology here daily:☞Security Discussion on malware, ransomware, and much more!
☞24/7 hard- and software tech support (+mobile!)
☞Virus and malware removal support
☞Tons of tutorials, guides and solutions
☞The very finest of our voluntary Support Staff
☞Much, much more absolutely FREE of any charge!

Note to non-members: Guests are able to open topics and reply to posts; however, guests are not allowed to create their own profile, unless they register (which you can do so below). By registering, you unlock many more capabilities of this site, and are able to interact with other members including making friends! Who wouldn't love a friendly tech community? Join us now!

Hello and welcome to GeekPolice.Net My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.2. The fixes are specific to your problem and should only be used for this issue on this machine.3. If you don't know or understand something, please don't hesitate to ask.4. Please DO NOT run any other tools or scans while I am helping you.5. It is important that you reply to this thread. Do not start a new topic.6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.*************************************************************************Update Your Java (JRE)

Old versions of Java have vulnerabilities that malware can use to infect your system.

Additional Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.*******************************************************Malwarebytes' Anti-Rootkit

Be sure to print out and follow the instructions provided on that same page for performing a scan.

Caution: This is a beta version so also read the disclaimer and back up all your data before using.

When the scan completes, click on the Cleanup button to remove any threats found and reboot the computer if prompted to do so.

Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.

If there are problems with Internet access, Windows Update, Windows Firewall or other system issues, run the fixdamage tool located in the folder Malwarebytes Anti-Rootkit was run from and reboot your computer.

Two files (mbar-log-YYYY-MM-DD, system-log.txt) will be created and saved within that same folder.

Copy and paste the contents of these two log files in your next reply.

Your computer has keygens, which is a form of software piracy. What is so bad about Cracks, Hacks, Pirated software, warez, or Keygens?

Most popular cracks or keygens I see, are for Adobe CS3, a lot of different games, Nero, Kaspersky antivirus, and much more. All of these cracks and keygens have what is called "cloaked malware," which is a form of spyware or viruses or trojans that hide themselves inside the keygen or crack files. Most hacks for games that come in the form of a program or installer, will also be infected. It is the opportunity for attackers to present a seemingly safe situation where the opportunity to steal something is in play, while the malware infects your system in the process. Yes, it will install what you were looking for, but also allow malware to potentially take control of your computer.

Lastly, it is illegal. I will counsel you that we do not report such incidents. However, it is not good practice to pirate software.*****************************************************I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan

Click on to download the ESET Smart Installer. Save it to your desktop.

Double click on the icon on your desktop.

•Check •Click the button.•Accept any security warnings from your browser.

Leave the check mark next to Remove found threats.

•Check •Push the Start button.•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.•When the scan completes, push •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.•Push the button.•Push A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt

Click OK on the Disk Cleanup Screen.Click Yes on the Confirmation screen.

This runs the Disk Cleanup utility along with other selections if you have chosen any. (if you had a lot System Restore points, you will see a significant change in the free space in C drive)***************************************This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...This is a very crucial step so make sure you don't skip it.Download DelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

Double-click Delfix.exe to start the tool.Make sure the following items are checked:

Activate UAC (optional; some users prefer to keep it off)

Remove disinfection tools

Create Registry backup

Purge System Restore Points

Re-set system settings

Now click "Run" and wait patiently.Once finished a logfile will be created. You don't have to attach it to your next reply.**************************************I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.